Source group based security group rule without protocol and port causes failures
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Compute (nova) |
Fix Released
|
High
|
Soren Hansen | ||
Essex |
Fix Released
|
Undecided
|
Thierry Carrez | ||
nova (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Oneiric |
Fix Released
|
Undecided
|
Steve Beattie | ||
Precise |
Fix Released
|
Undecided
|
Steve Beattie |
Bug Description
I saw this on Essex, but looking at Folsom, this problem exists there, too.
If you add a security group rule granting security group A full access (no protocol and port specifications) to any instance in security group B, you will see an error like:
2012-06-08 14:52:37 TRACE nova.rpc.amqp Traceback (most recent call last):
2012-06-08 14:52:37 TRACE nova.rpc.amqp File "/usr/lib/
2012-06-08 14:52:37 TRACE nova.rpc.amqp rval = node_func(
2012-06-08 14:52:37 TRACE nova.rpc.amqp File "/usr/lib/
2012-06-08 14:52:37 TRACE nova.rpc.amqp return f(*args, **kw)
2012-06-08 14:52:37 TRACE nova.rpc.amqp File "/usr/lib/
2012-06-08 14:52:37 TRACE nova.rpc.amqp return self.driver.
2012-06-08 14:52:37 TRACE nova.rpc.amqp File "/usr/lib/
2012-06-08 14:52:37 TRACE nova.rpc.amqp self.firewall_
2012-06-08 14:52:37 TRACE nova.rpc.amqp File "/usr/lib/
2012-06-08 14:52:37 TRACE nova.rpc.amqp self.do_
2012-06-08 14:52:37 TRACE nova.rpc.amqp File "/usr/lib/
2012-06-08 14:52:37 TRACE nova.rpc.amqp retval = f(*args, **kwargs)
2012-06-08 14:52:37 TRACE nova.rpc.amqp File "/usr/lib/
2012-06-08 14:52:37 TRACE nova.rpc.amqp self.add_
2012-06-08 14:52:37 TRACE nova.rpc.amqp File "/usr/lib/
2012-06-08 14:52:37 TRACE nova.rpc.amqp ipv4_rules, ipv6_rules = self.instance_
2012-06-08 14:52:37 TRACE nova.rpc.amqp File "/usr/lib/
2012-06-08 14:52:37 TRACE nova.rpc.amqp protocol = rule.protocol.
2012-06-08 14:52:37 TRACE nova.rpc.amqp AttributeError: 'NoneType' object has no attribute 'lower'
..thus rendering further processing impossible.
Related branches
- Chuck Short: Pending requested
-
Diff: 56 lines (+14/-4)3 files modifieddebian/changelog (+8/-0)
debian/control (+6/-3)
debian/nova-console.install (+0/-1)
CVE References
Changed in nova: | |
importance: | Undecided → Medium |
Changed in nova: | |
assignee: | nobody → Vish Ishaya (vishvananda) |
no longer affects: | nova/folsom |
Changed in nova (Ubuntu Oneiric): | |
status: | New → In Progress |
Changed in nova (Ubuntu Precise): | |
status: | New → In Progress |
Changed in nova (Ubuntu Oneiric): | |
assignee: | nobody → Steve Beattie (sbeattie) |
Changed in nova (Ubuntu Precise): | |
assignee: | nobody → Steve Beattie (sbeattie) |
tags: |
added: verification-done removed: verification-needed |
Changed in nova: | |
status: | Fix Committed → Fix Released |
Changed in nova (Ubuntu): | |
status: | Confirmed → Fix Released |
Changed in nova: | |
milestone: | folsom-2 → 2012.2 |
no longer affects: | nova/diablo |
Sounds like this is a bug in the patch for this bug: https:/ /bugs.launchpad .net/nova/ +bug/985184
Since an advisory went out for that, we should probably just commit the fix directly, and then post a follow-up to the security advisory to the mailing list indicating that the original patch was not sufficient.